1.
Which VMware solution uses the security of a vSphere implementation and provides lmked-clone technology to virtual desktops?
2.
Which is an important benefit provided by VLANs?
3.
What does vStorage APIs for Array Integration (VAAI) enable?
4.
After upgrading an ESXi host to vSphere 5.x from vSphere 4.x, which three actions must be taken? (Choose three.)
5.
What is a valid example of a vSphere Update- Manager orchestrated upgrade?
6.
An administrator is configuring a vSphere HA cluster for three ESXi hosts and their resident virtual machines. The cluster will be configured to support a single host failure. Resource reservations must be enforced during a failover event.  Assuming default settings, how does HA determine the current failover capacity?
7.
An administrator is unable to connect a vSphere Client to an ESXi host. Which option can be selected from the direct console to restore connectivity without disrupting running virtual machines?
8.
An administrator revokes user permissions on an object in vCenter Server. At the time the permissions are revoked, the user is actively logged in to vCenter Server through the vSphere Cleint. What is true regarding this scenario?
9.
What is a object to which an extent can be added?
10.
What does the recommended maximum memory value that is displayed when configuring a virtual represent?